XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: A/B Testing

Know Your Tech: A/B Testing

A key component to effectively attracting your audience is to better understand their preferences. Even the most seemingly insignificant change, like changing the color of the buttons on your website, can have a major impact on how effective your materials are. Fortunately, through a process called A/B testing, observing the impact of these changes is somewhat straightforward.

A/B Testing, Defined
Running an A/B test is the process of comparing a single variable to deem which option, Option A or Option B, is the more effective of the two. The key to an effective A/B test is to only change one thing between the two test subjects - otherwise, you have no way of knowing exactly what it was that was the influential change.

A/B tests can be used to make a wide variety of choices, from something as simple as an adjustment to a call-to-action to a different layout to a particular page. In this case, Option A should be the way things currently are to serve as a control for the experiment, while Option B displays your proposed change. Each option is then presented to an equally-sized segment of your audience to deem which of the two is the more effective.

Setting Up an A/B Test
A/B testing can be used to make a vast number of decisions, as long as they are approached one at a time. As we said before, if multiple variables are involved in a single test, that test isn’t going to deliver reliable enough results to make any well-supported decisions. It is also worth mentioning that A/B testing tends to work better when comparing options for relatively minor changes, like calls-to-action or images included in an email or on a landing page, rather than big ones.

The first step will be to decide which variable you intend to test, followed by your determination of a metric to base your observations against. Does this change boost engagement? Increase the time spent on page? Improve your click-through rate?

Once this has been accomplished, you’re ready to state what your control option will be, and what your change will be after that. Your control group should be whatever you currently have in place, so you can accurately judge if a change would be an improvement or not. Then you need to settle on a sample size, or the number of recipients that will be a part of this test.

Not all changes will be accurately measured with a sample size alone. Some changes would be better left running until a statistically significant data sample has been collected. Speaking of statistical significance, you will also need to decide how significant your results have to be before a change is deemed to be worthwhile.

Running An A/B Test
There are two real keys to running a successful A/B test: first, you have to give it enough time to collect the data you’ll need to come to a conclusion, and second, both options need to be tested at the same time to prevent other variables from affecting your data. Of course, if the variable that your A/B test is evaluating is timing, this doesn’t apply so much.

In short, A/B testing is a relatively simple way to make sure that you’re having as large an impact on your audience as possible. Can you think of any times that you’ve done something similar to test out a proposed change? Tell us about it in the comments!

Hackers Target Major Sporting Events
Hackers Plus Artificial Intelligence Equals Big Tr...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, April 21 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Hosted Solutions Managed Service Provider Data Small Business Hackers Google Hardware Mobile Devices Network Security VoIP Productivity Mobile Office Malware Email Gadgets Quick Tips Efficiency Network Business Management Innovation IT Services IT Support Social Media Smartphones Business Business Continuity Server Miscellaneous Communication Upgrade Communications User Tips Virtualization Windows Disaster Recovery Data Backup Computer Microsoft Office Users Managed IT Services Passwords Data Recovery Smartphone Mobile Device Management Android Browser Productivity Internet of Things Holiday WiFi Save Money Marketing Alert Ransomware Tech Term Vendor Management Outsourced IT Cloud Computing Operating System Artificial Intelligence BDR Mobile Computing Cybercrime Cybersecurity Windows 10 Remote Monitoring Chrome Router Information Technology Avoiding Downtime Remote Computing Bring Your Own Device Computers Collaboration Apple BYOD Automation Spam Current Events Health Big Data Best Practice VPN History IT Solutions The Internet of Things Managed IT Services Firewall Telephone Systems Going Green Social Engineering Proactive IT Employer-Employee Relationship Phishing Windows 10 Trending Phone System Application Wireless Technology Printer Facebook IT Consultant Hacking Encryption Office Excel Mobility Budget Training IT Support App Lithium-ion Battery Bandwidth Mobile Device Money Networking How To Fax Server Unified Threat Management Office 365 Applications Business Intelligence Maintenance Windows 8 Two-factor Authentication iPhone Mouse Recovery Content Filtering Business Managament Private Cloud Redundancy Virus Law Enforcement Gmail PowerPoint Access Control Antivirus Settings Information Analytics Customer Relationship Management Google Drive Hard Drives File Sharing Data Protection Managed IT Blockchain User Error Word Sports Humor Save Time Value Outlook Data Security Website Apps Tutorials Voice over Internet Protocol Education Computer Repair Data Management Streaming Media Risk Management Compliance Flexibility IT Management Servers Entertainment Saving Time Administrator Wireless Augmented Reality Retail Machine Learning Human Resources Tech Support Downtime Analysis Software as a Service Scam Memory Inbound Marketing Display Managed Service Network Congestion Hacker Social Paperless Office Business Technology Conferencing Vulnerability Connectivity Wi-Fi Search Tablet Administration Identity Theft Twitter Office Tips Digital Payment Meetings Document Management Social Networking Telephone System Video Surveillance Statistics Credit Cards DDoS Webinar Data loss Solid State Drive Piracy Black Market Programming Smart Tech Help Desk IBM Skype Cryptocurrency Leadership Fraud Spam Blocking Instant Messaging CES IT Plan Physical Security Intranet Environment Cleaning Password Running Cable Computer Accessories Wearable Technology Manufacturing Public Cloud SaaS Net Neutrality Biometrics Content Management IT service Unsupported Software Infrastructure Data storage Best Available OneNote Bluetooth Virtual Private Network Update Data Storage eWaste Internet Exlporer People Touchscreen Comparison Keyboard Telephony PDF Samsung Google Docs Staff Safety Virtual Assistant Work/Life Balance Data Breach USB Windows 7 HaaS End of Support Robot Government Online Currency Botnet YouTube Recycling Workers Point of Sale Healthcare Digital Signature IT Security IoT Supercomputer Hiring/Firing Distribution Regulations Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Windows Media Player Virtual Desktop Print Server NIST Multiple Versions HBO Thought Leadership E-Commerce Cost Management Travel Criminal NarrowBand Employee Millennials Customers Remote Support Line of Business Upgrades Analyitcs Webcam Mobile Cortana Uninterrupted Power Supply nternet Crowdfunding Electronic Health Records eCommerce Multi-Factor Security Strategy Knowledge Logistics Wireless Charging Advertising Wire Microchip FENG Customer Service Law Firm IT Consultant Restore Data Frequently Asked Questions Distributed Denial of Service Files Company Culture Content Filter Camera Patch Management Chromecast Screen Mirroring Digital Signage PC Care Workforce Authentication MSP 360 Emails Professional Services Google Apps Vendor 3D Lifestyle Insurance Scheduling Flash Fiber-Optic Notifications LinkedIn Smart Office Electronic Medical Records Cameras Laptop Safe Mode Business Owner Licensing Backup and Disaster Recovery Tip of the week Amazon Colocation Storage Windows 10s eBay HVAC Security Cameras Charger Cast WIndows 7 Google Search Alerts Telecommuting SharePoint Windows 8.1 Update Nanotechnology Remote Worker Virtual Reality Tools Shadow IT Practices HIPAA Biometric Security Sync Cables Hybrid Cloud Search Engine Hiring/Firing Macro Printer Server Shortcut Touchpad Debate Accountants User Cryptomining Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Co-managed IT Worker Commute Text Messaging Enterprise Content Management Employee/Employer Relationship Computer Care Managing Stress Domains ISP Work Station Software Tips Remote Work Relocation Wiring Hosted Solution Bloatware Gaming Console Password Manager Legal Monitor Hosted Computing Proactive Science 5G Unified Communications Students Bing Database Online Shopping Cache Project Management Audit Password Management File Versioning Devices GDPR Netflix Entrepreneur Business Mangement Smartwatch Data Warehousing Specifications Reputation Inventory Remote Monitoring and Maintenance Tablets OLED Start Menu Theft Shortcuts Root Cause Analysis Battery Content Two Factor Authentication Emergency Video Games Worker Music Regulation Audiobook Thank You Assessment Scalability Rootkit Politics Utility Computing How to Congratulations Television Printers Transportation Troubleshooting Webinar Techology Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *